Is315 Chapter 5 Review Questions

Submitted by: Submitted by

Views: 1362

Words: 454

Pages: 2

Category: Science and Technology

Date Submitted: 07/25/2011 09:55 AM

Report This Essay

1. Security testers and hackers use which of the following to determine the services running on a host and the vulnerabilities associated with those services?

• D. Port scanning

2. What is the most popular port-scanning tool used today?

• C. Nmap

3. To receive extensive Nmap information and examples of the correct syntax to use in a Linux shell, which of the following commands should you type?

• D. man nmap

4. To receive a brief summary of Nmap commands in a Linux shell, which of the following should you do?

• A. Type nmap –h.

5. Which of the following Nmap commands sends s SYN packet to a computer with an IP address of 193.145.85.210?

• A. nmap –sS 193.145.85.210

• B. nmap –v 193.145.85.210

6. Which flags are set on a packet sent with the nmap –sX 193.145.85.202 command?

• A. FIN

• B. PSH

• D. URG

7. Which Nmap command verifies whether the SSH port is open on any computers on the 192.168.1.0 network?

• A. nmap –v 192.168.1.0-254 –p22

8. A closed port responds to a SYN packet with a(n) _____________ packet.

• D. RST

9. Which type of scan is usually used to bypass a firewall or packet-filtering device?

• A. an ACK scan

10. Security testers can use Hping to bypass filtering devices.

• True

11. A FIN packet sent to a closed port responds with a(n) __________ packet.

• C. RST

12. A(n) ________ scan sends a packet with all flags set to NULL.

• A. NULL

13. What is a potential danger of performing a ping sweep on a network?

• A. Including a broadcast address in the ping sweep range

14. Port scanning provides the state for all but which of the following ports?

• D. buffered

15. A NULL scan requires setting for the FIN, ACK, and URG flags.

• False

16. Why does the fping –f 193.145.85.201 193.145.85.220 command cause an error?

• D. IP ranges are not allowed with this command

17. In basic network scanning, ICMP Echo Requests (type 8) are sent to host computers from the attacker, who waits for which type of...